<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Docker and dependencies</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:3084-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-12T08:35:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-12T08:35:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-12T08:35:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Docker and dependencies</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for Docker and its dependencies fixes the following issues:

- fix runc and containerd revisions (bsc#1009961)

docker:

- Updates version 1.11.2 to 1.12.3 (bsc#1004490, bsc#996015, bsc#995058)
- Fix ambient capability usage in containers (bsc#1007249, CVE-2016-8867)
- Change the internal mountpoint name to not use ':' as that character can be considered 
  a special character by other tools. (bsc#999582)
- Add dockerd(8) man page.
- Package docker-proxy (which was split out of the docker binary in 1.12). (bsc#995620)
- Docker 'migrator' prevents installing 'docker', if docker 1.9 was installed before but 
  there were no images. (bsc#995102)
- Specify an 'OCI' runtime for our runc package explicitly. (bsc#978260)
- Use gcc6-go instead of gcc5-go (bsc#988408)

For a detailed description of all fixes and improvements, please refer to:

https://github.com/docker/docker/releases/tag/v1.12.3
https://github.com/docker/docker/blob/v1.12.2/CHANGELOG.md 
https://github.com/docker/docker/releases/tag/v1.12.1
https://github.com/docker/docker/releases/tag/v1.12.0

containerd:

- Update to current version required from Docker 1.12.3.
- Add missing Requires(post): %fillup_prereq. (bsc#1006368)
- Use gcc6-go instead of gcc5-go. (bsc#988408) 

runc:

- Update to current version required from Docker 1.12.3.
- Use gcc6-go instead of gcc5-go. (bsc#988408)

rubygem-excon:

- Updates version from 0.39.6 to 0.52.0.

For a detailed description of all fixes and improvements, please refer to the installed changelog.txt.

rubygem-docker-api:

- Updated version from 1.17.0 to 1.31.0.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-OpenStack-Cloud-6-2016-1794,SUSE-SLE-Module-Containers-12-2016-1794</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163084-1/</URL>
      <Description>Link for SUSE-SU-2016:3084-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-December/002467.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:3084-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1004490</URL>
      <Description>SUSE Bug 1004490</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1006368</URL>
      <Description>SUSE Bug 1006368</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1007249</URL>
      <Description>SUSE Bug 1007249</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009961</URL>
      <Description>SUSE Bug 1009961</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/974208</URL>
      <Description>SUSE Bug 974208</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/978260</URL>
      <Description>SUSE Bug 978260</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/983015</URL>
      <Description>SUSE Bug 983015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/987198</URL>
      <Description>SUSE Bug 987198</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/988408</URL>
      <Description>SUSE Bug 988408</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989566</URL>
      <Description>SUSE Bug 989566</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995058</URL>
      <Description>SUSE Bug 995058</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995102</URL>
      <Description>SUSE Bug 995102</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/995620</URL>
      <Description>SUSE Bug 995620</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/996015</URL>
      <Description>SUSE Bug 996015</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/999582</URL>
      <Description>SUSE Bug 999582</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-8867/</URL>
      <Description>SUSE CVE CVE-2016-8867 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Containers 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Containers 12">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12" CPE="cpe:/o:suse:sle-module-containers:12">SUSE Linux Enterprise Module for Containers 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 6">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 6">
        <FullProductName ProductID="SUSE OpenStack Cloud 6" CPE="cpe:/o:suse:suse-openstack-cloud:6">SUSE OpenStack Cloud 6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="containerd-0.2.4+gitr565_0366d7e-9.1">
      <FullProductName ProductID="containerd-0.2.4+gitr565_0366d7e-9.1">containerd-0.2.4+gitr565_0366d7e-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="docker-1.12.3-81.2">
      <FullProductName ProductID="docker-1.12.3-81.2">docker-1.12.3-81.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="runc-0.1.1+gitr2816_02f8fa7-9.1">
      <FullProductName ProductID="runc-0.1.1+gitr2816_02f8fa7-9.1">runc-0.1.1+gitr2816_02f8fa7-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-docker-api-1.31.0-11.2">
      <FullProductName ProductID="ruby2.1-rubygem-docker-api-1.31.0-11.2">ruby2.1-rubygem-docker-api-1.31.0-11.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="ruby2.1-rubygem-excon-0.52.0-9.1">
      <FullProductName ProductID="ruby2.1-rubygem-excon-0.52.0-9.1">ruby2.1-rubygem-excon-0.52.0-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="containerd-0.2.4+gitr565_0366d7e-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:containerd-0.2.4+gitr565_0366d7e-9.1">containerd-0.2.4+gitr565_0366d7e-9.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-1.12.3-81.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:docker-1.12.3-81.2">docker-1.12.3-81.2 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-docker-api-1.31.0-11.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-docker-api-1.31.0-11.2">ruby2.1-rubygem-docker-api-1.31.0-11.2 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="ruby2.1-rubygem-excon-0.52.0-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-excon-0.52.0-9.1">ruby2.1-rubygem-excon-0.52.0-9.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="runc-0.1.1+gitr2816_02f8fa7-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Containers 12">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Containers 12:runc-0.1.1+gitr2816_02f8fa7-9.1">runc-0.1.1+gitr2816_02f8fa7-9.1 as a component of SUSE Linux Enterprise Module for Containers 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="containerd-0.2.4+gitr565_0366d7e-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 6">
      <FullProductName ProductID="SUSE OpenStack Cloud 6:containerd-0.2.4+gitr565_0366d7e-9.1">containerd-0.2.4+gitr565_0366d7e-9.1 as a component of SUSE OpenStack Cloud 6</FullProductName>
    </Relationship>
    <Relationship ProductReference="docker-1.12.3-81.2" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 6">
      <FullProductName ProductID="SUSE OpenStack Cloud 6:docker-1.12.3-81.2">docker-1.12.3-81.2 as a component of SUSE OpenStack Cloud 6</FullProductName>
    </Relationship>
    <Relationship ProductReference="runc-0.1.1+gitr2816_02f8fa7-9.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 6">
      <FullProductName ProductID="SUSE OpenStack Cloud 6:runc-0.1.1+gitr2816_02f8fa7-9.1">runc-0.1.1+gitr2816_02f8fa7-9.1 as a component of SUSE OpenStack Cloud 6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Docker Engine 1.12.2 enabled ambient capabilities with misconfigured capability policies. This allowed malicious images to bypass user permissions to access files within the container filesystem or mounted volumes.</Note>
    </Notes>
    <CVE>CVE-2016-8867</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Containers 12:containerd-0.2.4+gitr565_0366d7e-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:docker-1.12.3-81.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-docker-api-1.31.0-11.2</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:ruby2.1-rubygem-excon-0.52.0-9.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Containers 12:runc-0.1.1+gitr2816_02f8fa7-9.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 6:containerd-0.2.4+gitr565_0366d7e-9.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 6:docker-1.12.3-81.2</ProductID>
        <ProductID>SUSE OpenStack Cloud 6:runc-0.1.1+gitr2816_02f8fa7-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163084-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-8867.html</URL>
        <Description>CVE-2016-8867</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1007249</URL>
        <Description>SUSE Bug 1007249</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
